You lead a team in the performance of data acquisition, data recovery and forensics analysis of infected operating systems and servers. You perform forensics analysis to support daily vulnerability assessments, briefs, and general computer forensics operations. You also use forensics tools and investigative methods to find specific electronic data, locate malicious code and determine malware artefacts. Your challenge is to keep pace with shorter product cycles and advances in OS and software applications, as well as to stay ahead of developments in order to anticipate demands for forensic investigations and analysis.
You must have a tertiary qualification, preferably in information technology, computer science or computer engineering. You should have at least 8 years’ work experience in IT or a cyber-related field, with exposure to forensics analysis, network systems and various computer hardware using Windows and non-Windows operating systems. You should also have sound and current knowledge of cyber security technologies, and strong communication and interpersonal skills. Possession of a good understanding of forensic artefacts in operating systems, data recover technology and forensic investigation procedures is advantageous. Candidates with professional certification related to cyber incident handling or computer forensics, such as GCIH, GCFE and GMOB, would be favourably considered.
Only shortlisted candidates will be notified.